ElGamal encryption

Results: 138



#Item
71ElGamal encryption / Malleability / RSA / Index of cryptography articles / Mental poker / Cryptography / Public-key cryptography / Proxy re-encryption

Distributed Blinding for Distributed ElGamal Re-encryption Lidong Zhou Microsoft Research Silicon Valley Mountain View, CA [removed]

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-09-09 23:04:55
72Security / Malleability / ElGamal encryption / RSA / Applied mathematics / Blinding / Public-key cryptography / Cryptography / Cyberwarfare

Distributed Blinding for ElGamal Re-encryption∗ Lidong Zhou†, Michael A. Marsh‡, Fred B. Schneider§, and Anna Redz¶ January 2, 2004 Abstract

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-05-16 13:38:04
73Mathematics / Homomorphic encryption / Paillier cryptosystem / Electronic commerce / Applied mathematics / Homomorphism / ElGamal encryption / Group homomorphism / RSA / Public-key cryptography / Morphisms / Cryptography

An Overview of Homomorphic Encryption Alexander Lange Department of Computer Science Rochester Institute of Technology Rochester, NY 14623

Add to Reading List

Source URL: www.cs.rit.edu

Language: English - Date: 2011-05-15 17:17:55
74Cramer–Shoup cryptosystem / Plaintext-aware encryption / Chosen-ciphertext attack / Chosen-plaintext attack / Advantage / Ciphertext / ElGamal encryption / RSA / Cipher / Cryptography / Public-key cryptography / Ciphertext indistinguishability

Towards Plaintext-Aware Public-Key Encryption without Random Oracles Mihir Bellare and Adriana Palacio Dept. of Computer Science & Engineering, University of California, San Diego 9500 Gilman Drive, La Jolla, CA 92093, U

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
75Key management / Cryptographic protocols / Digital signature / XTR / ElGamal encryption / Group signature / RSA / Public key certificate / Proof of knowledge / Cryptography / Public-key cryptography / Electronic commerce

Efficient Group Signatures without Trapdoors? Giuseppe Ateniese and Breno de Medeiros The Johns Hopkins University Department of Computer Science Baltimore, MD 21218, USA [removed], [removed]

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
76Homomorphic encryption / Oblivious transfer / Paillier cryptosystem / Naccache–Stern cryptosystem / Commitment scheme / ElGamal encryption / Transmission Control Protocol / Cryptography / Public-key cryptography / Cryptographic protocols

Verifiable Homomorphic Oblivious Transfer and Private Equality Test Helger Lipmaa Laboratory for Theoretical CS, Department of CS&E Helsinki University of Technology, P.O.Box 5400, FIN[removed]HUT, Espoo, Finland helger@tc

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
77Finite fields / Electronic commerce / Paillier cryptosystem / Okamoto–Uchiyama cryptosystem / Goldwasser–Micali cryptosystem / XTR / ElGamal encryption / Diffie–Hellman problem / RSA / Cryptography / Public-key cryptography / Computational hardness assumptions

A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and its Applications Emmanuel Bresson1 , Dario Catalano2 , and David Pointcheval2 1

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
78ElGamal encryption / ID-based encryption / Cipher / Chosen-plaintext attack / RSA / Proxy re-encryption / Integrated Encryption Scheme / Cryptography / Ciphertext indistinguishability / Semantic security

Simple Functional Encryption Schemes for Inner Products Michel Abdalla, Florian Bourse, Angelo De Caro, and David Pointcheval ´ D´epartement d’Informatique, Ecole normale sup´erieure

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-10 08:30:29
79Oblivious transfer / Secure multi-party computation / Decisional Diffie–Hellman assumption / ElGamal encryption / XTR / IP / Degree of a polynomial / Proof of knowledge / Cryptography / Cryptographic protocols / Polynomials

Oblivious Polynomial Evaluation and Secure Set-Intersection from Algebraic PRFs Carmit Hazay∗ Abstract In this paper we study the two fundamental functionalities oblivious polynomial evaluation in the

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-03 11:03:18
80Cyberwarfare / Electronic commerce / Security / Applied mathematics / Paillier cryptosystem / ElGamal encryption / Semantic security / Malleability / RSA / Cryptography / Public-key cryptography / Homomorphic encryption

Computing Blindfolded: New Developments in Fully Homomorphic Encryption Vinod Vaikuntanathan University of Toronto Abstract— A fully homomorphic encryption scheme enables computation of arbitrary functions on encrypte

Add to Reading List

Source URL: www.cs.toronto.edu

Language: English - Date: 2011-09-08 00:17:47
UPDATE